Detailed reporting: For complete insight into who is doing what and when in your cloud environment—audit logs of all environmental changes Data encryption: Stored with 256-bit encryption at rest and 128-bit Secure Sockets Layer encryption while in transit
SecRAMP unifies the management and monitoring of multi-cloud environments with the same best-of-breed security technologies that are commonly deployed in any customer-operated data center or managed hosting environment. SecRAMP represents the customer as they work with their cloud provider to properly validate and help implement security measures that the cloud provider may not provide but are necessary for the protection of the customer’s key data. Our team has expertise implementing and managing the leading security tools and commercial products in extremely large and complex multitenant cloud environments.
Virtustream enables full security monitoring, protection, and auditing at the most granular level by providing the ability to perform firewall, intrusion detection, antivirus, anti-rootkit, and compliance checking from the hypervisor. This comprehensive approach ensures the security of each virtual machine. Gathering this data into a security correlation engine is most efficiently done using a single point of presence at the hypervisor. With the Virtustream security correlation engine, we are able to take the traffic and event logs from all of the security checkpoints outlined above and generate concise, actionable alerts out of the mountains of log data available. This ensures that customers are alerted to any actionable security event that arises. To accomplish the same level of security monitoring, protection, and auditing, many solutions require the installation of software agents or the implementation of a network-wide appliance. Managing software agents requires yet another layer of management overhead and usually requires multiple tools to accomplish the same feature set described above. Network-wide appliances do not typically see intranetwork communications between servers and cannot look as closely into a system to discover threats such as rootkits.
20 Intel IT Center Vendor Round Table | Cloud Security